All articles tagged with security
The perimeter is dead. With GDPR enforcement looming in 2018, relying on a VPN is no longer sufficient. We dissect how to implement Google-style Zero Trust architecture using standard Linux tools and CoolVDS KVM instances.
The perimeter is dead. With GDPR enforcement looming and sophisticated threats bypassing traditional firewalls, relying on a VPN is no longer enough. Here is how to architect a Zero-Trust environment using standard Linux tools on high-performance KVM architecture.
With the new EU data regulations looming, manual server hardening is a liability. Learn how to automate security baselines on CentOS 7 using Ansible and OpenSCAP, ensuring your infrastructure meets Norwegian Datatilsynet standards before the audit hits.
The 'castle-and-moat' security model is dead. Learn how to implement Google-style BeyondCorp principles using Nginx mTLS, rigorous segmentation, and Norwegian data sovereignty on CoolVDS.
Default Docker configurations are dangerous. Learn how to drop capabilities, enforce non-root users, and isolate kernels to satisfy Datatilsynet and sleep at night.
Containers are not magic security boxes. From kernel exploits to network breaches, here is how to harden your Docker stack before the GDPR deadline hits.
With the GDPR deadline looming in 2018, manual server hardening is a liability. Learn how to automate security baselines using Ansible and OpenSCAP on Norwegian infrastructure.
The perimeter firewall is dead. With GDPR looming in 2018, relying on a 'trusted internal network' is negligence. Here is how to lock down your infrastructure using standard Linux tools, paranoia, and CoolVDS isolation.
With the GDPR enforcement date looming, the traditional 'castle and moat' security strategy is becoming a liability. We dismantle the perimeter and build a Zero-Trust model using KVM isolation, micro-segmentation, and rigorous identity management.
The 'castle-and-moat' security strategy is failing. In a world of ransomware and looming GDPR regulations, here is how to implement a Zero-Trust model using standard Linux tools available today.
Hope is not a strategy. Learn how to architect robust disaster recovery plans using rsync, Percona XtraBackup, and KVM snapshots, specifically tailored for Norwegian data compliance requirements.
The traditional VPN-based security model is failing. Learn how to implement a Zero-Trust architecture using KVM isolation, strict iptables segmentation, and mutual TLS to future-proof your Norwegian hosting stack before the 2018 GDPR enforcement.
It is February 2017. Ransomware is evolving, and relying on simple snapshots is a career-ending mistake. This guide covers RTO/RPO strategies, automated off-site replication scripts, and why Norwegian data sovereignty matters more than ever.
Perimeter security is no longer sufficient. Learn how to implement a Zero Trust model using Nginx mTLS, strict SSH 2FA, and segmented networking on KVM VPS, preparing your stack for the upcoming 2018 GDPR enforcement.
The traditional VPN castle-and-moat security model is obsolete. With GDPR looming, learn how to implement Google-style BeyondCorp principles using Nginx mTLS, iptables, and strict KVM isolation.
The 'perimeter' security model is dead. With GDPR looming and ransomware evolving, reliance on a single firewall is negligence. Here is how to implement a pragmatic Zero-Trust architecture on your VPS right now.
The 'castle and moat' security strategy is obsolete. With GDPR enforcement looming and sophisticated lateral attacks on the rise, Norwegian CTOs must pivot to a Zero-Trust model. Here is how to implement Google-style BeyondCorp security on your Linux infrastructure today.
We analyze the Dirty COW aftermath, user namespaces in Docker 1.12, and why true KVM isolation on Norwegian soil is your only defense against shared-kernel vulnerabilities.
The 'Castle and Moat' security strategy is dead. In this guide, we dismantle the perimeter and implement strict access controls, 2FA SSH, and encrypted tunnels on Ubuntu 16.04, ensuring your data in Norway remains untouchable.
The recent Dirty COW exploit was a wake-up call: containers are not sandboxes. In this deep dive, we explore how to harden Docker 1.12, manage kernel capabilities, and why running containers inside KVM slices is the only way to sleep at night.
The 'Dirty COW' exploit woke everyone up. Here is a battle-tested guide to locking down containers on Linux, why KVM is mandatory for true isolation, and how to navigate Norwegian data privacy in late 2016.
With the Safe Harbor framework invalidated and new EU regulations looming, manual security hardening is a liability. Learn how to automate server compliance using Ansible on CentOS 7 to satisfy auditors and secure your Nordic infrastructure.
The 'castle and moat' security strategy is dead. Learn how to implement a Zero-Trust architecture on Linux using Nginx mTLS, hardened SSH, and strict iptables rules on your VPS.
It is October 2016, and everyone is rushing to containerize. But default Docker settings are a security nightmare waiting to happen. Here is how to harden your stack using namespaces, capabilities, and KVM isolation.
With the EU's new data protection regulations looming, manual server hardening is a liability. Learn how to automate security compliance using Ansible on strict KVM infrastructure.
Manual deployments are a ticking time bomb. Learn how to implement a 'Git-Driven' workflow using Docker, Jenkins, and KVM virtualization to automate your Nordic infrastructure.
Docker is not a virtualization strategy; it is a delivery mechanism. We dissect kernel namespaces, capability dropping, and why running containers on KVM-backed infrastructure is the only way to satisfy Norwegian compliance standards.
Docker is revolutionizing deployment, but default configurations are a security nightmare. Learn how to lock down your containers, drop capabilities, and why KVM virtualization is your last line of defense.
With the recent invalidation of Safe Harbor and the looming EU Data Protection Reform, manual security is a liability. Learn how to automate server hardening on CentOS 7 and Ubuntu 16.04 using Ansible to satisfy Datatilsynet requirements.
It's September 2016, and Docker is everywhere. But most deployments in Norway are fundamentally insecure. Here is the battle-hardened guide to locking down your containers before you leak data.